The most severe vulnerabilities might lead to the execution of
arbitrary code with the rights of the user running the application.
Other vulnerabilities include program crashes and the acceptance of
forged certificates.